Cryptanalysis of certain variants of Rabin's signature scheme
Information Processing Letters
Security of Blind Discrete Log Signatures against Interactive Attacks
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Public Key Cryptosystem Based on the Subgroup Membership Problem
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Anonymous channel and authentication in wireless communications
Computer Communications
Cryptanalysis of Huang-Chang partially blind signature scheme
Journal of Systems and Software
Forgeability of Wang-Tang-Li's ID-based restrictive partially blind signature scheme
Journal of Computer Science and Technology
Efficient partially blind signature scheme with provable security
COCOON'06 Proceedings of the 12th annual international conference on Computing and Combinatorics
Hi-index | 0.00 |
Recently, the techniques of the partially blind signatures played an important role in many electronic commerce applications. Therefore, to guarantee the quality of the growing popular communication services, it is urgent to construct low-computation partially blind signature scheme for both parties of the signer and the requester to obtain a signature. So far there is no efficient and secure partially blind signature scheme for the signer and a signature requester. Based on the discrete logarithm and the Chinese Remainder Theorem, we propose an efficient and secure partially blind signature scheme for both the signer and the requester to obtain a signature. Moreover, the proposed scheme is easier than the existing partially blind signature schemes in the blinding procedure. Hence, our proposed scheme is suitable for the limited computation capacities of requesters such as smart cards or mobile units. Similarly, our scheme can let the signer provide more efficient services to the signature requester. So, it is very useful for many applications.